检索结果 - pessimismo~
在您的搜寻 Dewey Classification
在您的搜寻 Dewey Classification
在您的搜寻 主题建议
在您的搜寻 主题建议
-
1
Database systems : an application-oriented approach
出版 2006书本目录: “...Embedded SQLMore on Integrity ConstraintsDynamic SQLJDBC and SQLJODBCComparisonBibliographic NotesExercises PART THREE Optimizing DBMS Performance Chapter 9 Physical Data Organization and IndexingDisk OrganizationHeap FilesSorted FilesIndicesMultilevel IndexingHash IndexingSpecial-Purpose IndicesTuning Issues: Choosing Indices for an ApplicationBibliographic NotesExercises Chapter 10 The Basics of Query ProcessingOverview of Query ProcessingExternal SortingComputing Projection, Union, and Set DifferenceComputing SelectionComputing JoinsMultirelational JoinsComputing Aggregate FunctionsBibliographic NotesExercises Chapter 11 An Overview of Query OptimizationQuery Processing ArchitectureHeuristic Optimization Based on Algebraic EquivalencesEstimating the Cost of a Query Execution PlanEstimating the Size of the OutputChoosing a PlanBibliographic NotesExercises Chapter 12 Database TuningDisk CachesTuning the SchemaTuning the Data Manipulation LanguageToolsManaging Physical ResourcesInfluencing the OptimizerBibliographic NotesExercises PART FOUR Advanced Topics in Databases Chapter 13 Relational Calculus, Visual Query Languages, and Deductive DatabasesTuple Relational CalculusUnderstanding SQL through Tuple Relational CalculusDomain Relational Calculus and Visual Query LanguagesVisual Query Languages: QBE and PC DatabasesThe Relationship between Relational Algebra and the CalculiDeductive DatabasesBibliographic NotesExercises Chapter 14 Object DatabasesLimitations of the Relational Data ModelObject Databases versus Relational DatabasesThe Conceptual Object Data ModelObjects in SQL:1999 and SQL:2003The ODMG StandardCommon Object Request Broker ArchitectureBibliographic NotesExercises Chapter 15 XML and Web DataSemistructured Data Overview of XMLXML SchemaXML Query LanguagesBibliographic NotesExercises Chapter 16 Distributed DatabasesThe Application Designer's View of the DatabaseDistributing Data among Different DatabasesQuery Planning StrategiesBibliographic NotesExercises Chapter 17 OLAP and Data MiningOLAP and Data Warehouses-Old and NewA Multidimensional Model for OLAP ApplicationsAggregationROLAP and MOLAPImplementation IssuesPopulating a Data WarehouseData Mining TasksMining AssociationsClassification and Prediction Using Decision TreesClassification and Prediction Using Neural NetsClusteringBibliographic NotesExercises PART FIVE Transaction Processing Chapter 18 ACID Properties of TransactionsConsistencyAtomicityDurabilityIsolationThe ACID PropertiesBibliographic NotesExercises Chapter 19 Models of TransactionsFlat TransactionsProviding Structure within a TransactionStructuring an Application as Multiple TransactionsBibliographic NotesExercises Chapter 20 Implementing IsolationSchedules and Schedule EquivalenceRecoverability, Cascaded Aborts, and StrictnessModels for Concurrency ControlA Strategy for Immediate-Update Pessimistic Concurrency ControlsDesign of an Immediate-Update Pessimistic Concurrency ControlObjects and Semantic CommutativityAtomicity, Recoverability, and Compensating OperationsIsolation in Structured Transaction ModelsOther Concurrency ControlsBibliographic NotesExercises Chapter 21 Isolation in Relational DatabasesConflicts in a Relational DatabaseLocking and the SQL Isolation LevelsGranular Locking: Intention Locks and Index LocksTuning TransactionsMultiversion Concurrency ControlsBibliographic NotesExercises Chapter 22 Atomicity and DurabilityCrash, Abort, and Media FailureImmediate-Update Systems and Write-Ahead LogsRecovery in Deferred-Update SystemsRecovery from Media FailureBibliographic NotesExercises PART SIX Distributed Applications and the Web Chapter 23 Architecture of Transaction Processing SystemsTransaction Processing in a Centralized SystemTransaction Processing in a Distributed SystemThe TP Monitor: An OverviewThe TP Monitor: Global Atomicity and the Transaction ManagerThe TP Monitor: Remote Procedure CallThe TP Monitor: Peer-to-Peer CommunicationThe TP Monitor: Event CommunicationStorage ArchitecturesTransaction Processing on the InternetWeb Application Servers-J2EEBibliographic NotesExercises Chapter 24 Implementing Distributed TransactionsImplementing the ACID PropertiesAtomic TerminationTransfer of CoordinationDistributed DeadlockGlobal SerializationWhen Global Atomicity Cannot Be GuaranteedReplicated DatabasesDistributed Transactions in the Real WorldBibliographic NotesExercises Chapter 25 Web ServicesThe Basic IdeaWeb BasicsHypertext Transfer ProtocolSOAP: Message PassingWSDL: Specifying Web ServicesBPEL: Specifying Business ProcessesUDDI: Publishing and Discovering Information about ServicesWS-Coordination: Transactional Web ServicesBibliographic NotesExercises Chapter 26 Security and Electronic CommerceAuthentication, Authorization, and EncryptionEncryptionDigital SignaturesKey Distribution and AuthenticationAuthorizationAuthenticated Remote Procedure CallElectronic CommerceThe Secure Sockets Layer Protocol: CertificatesPassport: Single Sign-OnKeeping Credit Card Numbers PrivateThe Secure Electronic Transaction Protocol: Dual SignaturesGoods Atomicity, Certified Delivery, and EscrowElectronic Cash: Blind SignaturesSecurity in XML-Based Web ServicesBibliographic NotesExercises BibliographyIndexAppendices, available on the Web A An Overview of Transaction ProcessingIsolationAtomicity and DurabilityImplementing Distributed TransactionsBibliographic NotesExercises B Requirements and SpecificationsSoftware Engineering MethodologyThe Requirements Document for the Student Registration SystemRequirements Analysis-New IssuesSpecifying the Student Registration SystemThe Specification Document for the Student Registration System: Section IIIThe Next Step in the Software Engineering ProcessBibliographic NotesExercises C Design, Coding, and TestingThe Design ProcessTest PlanProject PlanningCodingIncremental DevelopmentThe Project Management PlanDesign and Code for the Student Registration SystemBibliographic NotesExercises...”
图书 -
2
Database concepts /
出版 2003书本目录: “...16 (6) Functions of an Application Program 17 (1) Functions of a DBMS 18 (1) Definition and Components of a Database 19 (2) Desktop Versus Organizational Database Systems 21 (1) How to Build a Database System 22 (2) Building a Data Model 22 (1) Creating a Database Design 23 (1) Implementing a Database 24 (1) Summary 24 (2) Review Questions 26 (1) Exercises 27 (1) Garden Glory Project Questions 28 (1) James River Jewelry Project Questions 28 (2) The Relational Model 30 (24) Chapter Objectives 30 (1) Relations 31 (2) A Sample Relation and Two Nonrelations 31 (1) A Note on Terminology 32 (1) Types of Keys 33 (8) Composite Keys 34 (1) Primary and Candidate Keys 34 (1) Foreign Keys and Referential Integrity 34 (4) Surrogate Keys 38 (3) Functional Dependencies and Normalization 41 (6) Functional Dependencies 41 (1) Primary and Candidate Keys Revisited 42 (1) Normalization 43 (1) Relational Design Principles 44 (1) Normalization Examples 44 (3) The Problem of Null Values 47 (1) Summary 48 (1) Review Questions 49 (1) Exercises 50 (1) Garden Glory Project Questions 51 (1) James River Jewelry Project Questions 52 (2) Structured Query Language 54 (31) Chapter Objectives 54 (1) A Sample Database 55 (2) SQL for Data Definition 57 (4) Defining Primary Keys with the ALTER TABLE Statement 59 (1) Defining Foreign Keys with the ALTER TABLE Statement 59 (1) Submitting SQL to the DBMS 59 (1) DROP Statements 60 (1) SQL for Relational Query 61 (14) Reading Specified Columns from a Single Table 62 (1) Reading Specified Rows from a Single Table 62 (2) Reading Specified Columns and Specified Rows from a Single Table 64 (1) Ranges, Wildcards, and Nulls in WHERE Clauses 65 (1) Sorting the Results 66 (1) SQL Built-In Functions 67 (2) Built-In Functions and Groupings 69 (1) Querying Multiple Tables with Subqueries 70 (1) Querying Multiple Tables with Joins 71 (3) Outer Joins 74 (1) SQL for Relational Data Modification 75 (3) Inserting Data 75 (1) Modifying Data 76 (1) Deleting Data 77 (1) Summary 78 (1) Review Questions 79 (2) Exercises 81 (1) Garden Glory Project Questions 81 (1) James River Jewelry Project Questions 82 (3) PART 2 DATABASE DESIGN AND MANAGEMENT 85 (80) Data Modeling and the Entity-Relationship Model 86 (24) Chapter Objectives 86 (1) The Requirements Stage 87 (1) The Entity-Relationship Data Model 88 (6) Entities 88 (1) Attributes 89 (1) Identifiers 89 (1) Relationships 90 (1) Three Types of Binary Relationships 90 (1) Recursive Relationships 91 (1) Entity-Relationship Diagrams 92 (1) Weak Entities 92 (2) Unified Modeling Language Entity-Relationship Diagrams 94 (2) UML Entities and Relationships 94 (1) UML Representation of Weak Entities 95 (1) An Example 96 (10) Heather Sweeney Designs 96 (1) The Seminar Customer List 97 (1) The Customer Form Letter 98 (3) The Sales Invoice 101 (2) Attribute Specifications 103 (1) Business Rules 103 (1) Validating the Data Model 104 (2) Summary 106 (1) Review Questions 107 (1) Exercises 108 (1) Garden Glory Project Questions 108 (1) James River Jewelry Project Questions 109 (1) Database Design 110 (25) Chapter Objectives 110 (1) Representing Entities with the Relational Model 111 (6) Normalization, Second Verse 112 (1) Normal Forms 113 (1) Domain/Key Normal Form 113 (1) Using Normalization Criteria 114 (1) Denormalization 115 (1) Representing Weak Entities 115 (2) Representing Relationships 117 (10) Representing One-to-One Relationships 117 (2) Questionable One-to-One Relationships 119 (1) Representing One-to-Many Relationships 119 (2) Representing Many-to-Many Relationships 121 (2) Representing Recursive Relationships 123 (4) Database Design at Heather Sweeney Designs 127 (4) Weak Entities 128 (1) Relationships 128 (1) Enforcing Referential Integrity 129 (2) Summary 131 (1) Review Questions 131 (2) Exercises 133 (1) Garden Glory Project Questions 133 (1) James River Jewelry Project Questions 134 (1) Database Administration 135 (30) Chapter Objectives 135 (1) The Database Processing Environment 136 (4) Queries, Forms, and Reports 136 (1) Internet Application Processing 137 (1) Client/Server and Traditional Application Processing 138 (1) Stored Procedures and Triggers 138 (1) The Need for Control, Security and Reliability 139 (1) Concurrency Control 140 (10) The Need for Atomic Transactions 140 (1) Concurrent Transaction Processing 141 (2) The Lost Update Problem 143 (1) Concurrency Problems: Dirty Reads, Inconsistent Reads, Phantom Reads 143 (1) Resource Locking 144 (1) Lock Terminology 144 (1) Serializable Transactions 145 (1) Deadlock 145 (1) Optimistic Versus Pessimistic Locking 146 (1) Declaring Lock Characteristics 147 (1) Consistent Transactions 148 (1) Transaction Isolation Level 149 (1) Database Security 150 (3) Processing Rights and Responsibilities 150 (1) DBMS Security 151 (1) Application Security 152 (1) Database Backup and Recovery 153 (4) Recovery via Reprocessing 153 (1) Recovery via Rollback and Rollforward 154 (3) Additional DBA Responsibilities 157 (1) Summary 158 (1) Review Questions 159 (2) Exercises 161 (1) Garden Glory Project Questions 162 (1) James River Jewelry Project Questions 163 (2) Appendix Database Processing with Microsoft Access 165 (40) Appendix Objectives 165 (1) Database Schema for Carbon River Construction 166 (2) Carbon River Schema Data Structure Diagram 167 (1) Column Design 167 (1) Creating Tables and Relationships Using Access 168 (7) Creating Tables 170 (1) Creating Relationships 171 (4) Creating Queries and SQL Statements 175 (6) Creating Simple Queries with the Graphical Tool 175 (5) Action Queries 180 (1) Creating Access Data Entry Forms 181 (9) Creating a Simple Form 181 (2) Using Default Values and Combo Boxes with Forms 183 (5) Looking Up Nonkey Data 188 (2) Creating Access Reports 190 (7) Banded Report Writers 190 (2) Computations in Reports 192 (1) Parameterized Reports 193 (4) Summary 197 (1) Review Questions 198 (2) Exercises 200 (1) Garden Glory Project Questions 201 (1) James River Jewelry Project Questions 202 (3) Glossary 205 (9) Index 214...”
图书